Analysis
-
max time kernel
140s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:43
Behavioral task
behavioral1
Sample
65a4cb96f9d16cd480396062ee4155207b50ffffcbd4d6c6269ef798b258d1be.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
65a4cb96f9d16cd480396062ee4155207b50ffffcbd4d6c6269ef798b258d1be.dll
Resource
win10v2004-20220812-en
1 signatures
150 seconds
General
-
Target
65a4cb96f9d16cd480396062ee4155207b50ffffcbd4d6c6269ef798b258d1be.dll
-
Size
85KB
-
MD5
92cce75d1f970f998cc358ecc1ef2161
-
SHA1
fdd8b1db81d0e2f3537932931fd9e97db4c30ce2
-
SHA256
65a4cb96f9d16cd480396062ee4155207b50ffffcbd4d6c6269ef798b258d1be
-
SHA512
1d1d879666915f5530148de81026a5030b119935957eeb02afdcebc31aab370f1f42956eb4e2be85b2d9ddc1427335304510cc49219d5dc4df671c0b1965908f
-
SSDEEP
1536:SAVJ0mWeB/iU9KtGgGML0FpH7WXJrHRu9IasdP+qGjQk0D4:zJ0mW8/i9tnGMgzH7WXJ7Y9gsjjdK4
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4904 4276 rundll32.exe 83 PID 4276 wrote to memory of 4904 4276 rundll32.exe 83 PID 4276 wrote to memory of 4904 4276 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65a4cb96f9d16cd480396062ee4155207b50ffffcbd4d6c6269ef798b258d1be.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65a4cb96f9d16cd480396062ee4155207b50ffffcbd4d6c6269ef798b258d1be.dll,#12⤵PID:4904
-